Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title page Acknowledgments Windows Server 2016: Domain Infrastructure Table of Contents Who Is This Book For? How Is This Book Organized? How to Stay in Touch? Establishing Account Policies
Enforcing Password Policy Configuring Account Lockout Policy Setting Kerberos Policy Using Authentication Policies
Creating Password Settings Objects Granting Capabilities, Privileges, and Rights Assigning User Rights
Assigning User Rights for a Domain or OU Assigning User Rights on a Specific Computer
Creating and Configuring Domain User Accounts
Configuring Account Options Configuring Profile Options Determining Effective Access Troubleshooting User Accounts
Working with Managed Service Accounts
Managed Service Account Fundamentals Creating Group Managed Service Accounts
Step 1: Create a Hosting Group Step 2: Create a KMS Root Key Step 3: Create the gMSA Step 4: Install the Account Step 5: Configure Service to use gMSA
Deleting Managed Service Accounts Resetting the Account Password Moving Managed Service Accounts Using Virtual Accounts
Maintaining User Accounts
Resetting Passwords Disabling and Enabling User Accounts Unlocking User Accounts Renaming User Accounts Moving User Accounts Deleting User Accounts
Recovering Deleted Accounts
Enabling Active Directory Recycle Bin Recovering Accounts from the Recycle Bin
Working with Groups
Creating Groups Modifying Groups Adding Members to Groups Searching for Groups in the Directory Deleting Groups
Managing Computer Accounts
Creating Computer Accounts in Active Directory Joining Computers to a Domain Performing an Offline Domain Join Moving Computer Accounts Disabling Computer Accounts Resetting Computer Accounts Deleting Computer Accounts Troubleshooting Computer Accounts
Active Directory Physical Architecture
A Top-Level View A View within the Local Security Authority
Decoding the Directory Service Architecture
Navigating Protocols and Client Interfaces Understanding the Directory Service Component Understanding the Extensible Storage Engine
Deletion without Recycle Bin Deletion with Recycle Bin
Data Store Architecture
Active Directory Logical Architecture
Understanding Objects Navigating Domains, Trees, and Forests Introducing Trusts Introducing Namespaces and Partitions Understanding Replication
Planning for Replication Planning for Search and Global Catalogs
Searching the Directory Accessing the Global Catalog Designating Global Catalog Servers Designating Replication Attributes
Planning for Compatibility
Understanding Domain Functional Levels Understanding Forest Functional Levels Managing Functional Levels
Authentication Essentials for Groups
Security Tokens and Membership Caching User Principal Names Enabling Membership Caching
Navigating Authentication Options
Understanding NTLM Understanding Kerberos Accessing Resources After Authentication
Understanding Domain Trusts
Two-Way Transitive Trusts Shortcut Trusts
Understanding Forest Trusts
Identifying Existing Trusts Establishing Trusts Verifying and Troubleshooting Trusts
Delegating Authentication
Understanding Delegated Authentication Implementing Delegated Authentication
Creating an Implementation or Update Plan Developing a Forest Plan
Selecting the Forest Namespace Building a Single Forest vs. Multiple Forests Understanding Forest Administration
Developing a Domain Plan
Creating a Domain Design Using a Single Domain vs. Multiple Domains Establishing the Forest Root Domain Changing Domain Design
Preinstallation Considerations for Active Directory
Selecting Your Hardware Configuring Active Directory for Fast Recovery Connecting Clients to Active Directory
Installing Active Directory Domain Services
Navigating Installation Options Adding the Active Directory Role Adding Domain Controllers to a Domain Creating New Domains in New Forests Adding a Domain or Domain Tree to a Forest Performing an Installation from Media
Cloning Virtualized Domain Controllers
Using Clones of Virtualized Domain Controllers Creating a Clone Virtualized Domain Controller Finalizing the Clone Deployment Troubleshooting the Clone Deployment
Uninstalling Active Directory Working with Organizational Units
Using OUs for Delegation Using OUs for Group Policy
Creating an OU Design
Using a Division or Business Unit Model Using a Geographic Model Using a Cost Center Model Using an Administration Model
Creating and Managing Organizational Units
Creating an OU Setting OU Properties Adding Accounts and Resources to an OU
Delegating Administration of Domains and OUs
Understanding Delegation of Administration Delegating Administration
Read-Only Domain Controllers: The Essentials
RODC Features RODC Placement
Installing RODCs
Preparing for an RODC Installation Installing an RODC Installing an RODC from Media Staging an RODC
Managing Password Replication Policy
Understanding Password Replication Policy Controlling Password Replication Managing Credentials on an RODC Verifying Account Access Status Resetting Credentials Delegating Administrative Permissions
Operations Master Roles: The Essentials
Establishing Operations Masters Identifying Operations Masters Positioning Operations Masters
Working with Schema Masters
Locating the Schema Master Transferring the Schema Master Role
Working with Domain Naming Masters
Locating the Domain Naming Master Transferring the Domain Naming Master Role
Working with Relative ID Masters
Understanding RIDs Managing RID Availability Locating the RID Master Transferring the RID Master Role
Working with PDC Emulators
How the PDC Emulator Manages Time Services Locating the PDC Emulator Transferring the PDC Emulator Role
Working with Infrastructure Masters
Locating the Infrastructure Master Transferring the Infrastructure Master
Forcing Operations Master Role Transfers
Preparing to Seize a FSMO Role Seizing a FSMO Role
Active Directory Sites: The Fundamentals
Expanding Your Site Plan Replication Within and Between Sites Determining Site Boundaries
Understanding Active Directory Replication
Tracking Replication Changes Over Time Tracking System Volume Changes Over Time Replication Architecture: An Overview Intersite Replication Essentials
Replication Rings and Directory Partitions Developing or Revising Your Site Design
Mapping Network Infrastructure Mapping Network Structure to Site Structure Designing the Individual Sites Designing the Intersite Replication Topology Considering the Impact of Site-Link Bridging Planning the Placement of Servers within Sites
Managing Sites and Subnets
Creating a Site Creating a Subnet Managing Domain Controllers within Sites
Managing Site Links and Intersite Replication
Navigating Replication Transport Options Creating a Site Link Configuring Replication Schedules for Site Links Configuring Site-Link Bridges Determining the ISTG Configuring Site Bridgehead Servers Configuring Advanced Site-Link Options
Monitoring and Troubleshooting Replication
Using the Replication Administrator Using PowerShell to Monitor and Troubleshoot Replication Using Performance Monitor to Track Replication Modifying Intersite Replication for Testing
Group Policy Fundamentals
Local vs Directory-based Group Policy Group Policy Settings Group Policy Architecture Administrative Templates Administration Tools
Using Local Group Policy Configuring Directory-based Policy
Getting Domain Information Accessing Forests, Domains, and Sites for Management Creating and Linking a New GPO Editing a GPO Linking to a GPO Working with Starter GPOs Deleting a GPO Using the Default GPOs
Managing Group Policy Through Delegation
Assigning GPO Creation Rights Reviewing Management Privileges Delegating Management Privileges Delegating Privileges for Links and RSoP
Managing Group Policy Inheritance
Understanding Policy Application Changing Link Order and Precedence Overriding Inheritance Blocking Inheritance Enforcing Inheritance Filtering Group Policy Application
Managing Policy Processing
Modifying Policy Processing Configuring Loopback Processing
Using Scripts in Group Policy
Configuring Computer Scripts Configuring User Scripts
Applying Group Policy Through Security Templates
Working with Security Templates Applying Security Templates
Maintaining and Troubleshooting Group Policy
Understanding Group Policy Refresh Modifying Group Policy Refresh Viewing Applicable GPOs and the Last Refresh Modeling GPOs for Planning Refreshing Group Policy Manually Backing Up GPOs Restoring GPOs Fixing Default Group Policy
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion